SlideShare a Scribd company logo
Tapping Into The Health of Your NetworkWebinar, Oct 28, 2010Intelligent Network Access and Monitoring Solutions
AgendaWhy monitor the health of your network?Common network monitoring toolsWhere Network Taps fit inTypes of Network Taps and their applicationNetwork TapsRegeneration TapsAggregator TapsBypass SwitchesData Monitoring Switches
PresenterAaron “AJ” JanssenField Application Engineer, Net Optics, Inc.Over 15 years experience deploying and configuring security & networking equipment, including Juniper Networks, Network Associates, McAfee, and Patchlink Inc.
Why monitor the health of your network?For Many Organizations, Network Performance Directly Impacts:Customer experienceBusiness efficiencyCompetitive advantageSecurity and complianceAnd ultimately….Revenue growth
Common Network Monitoring DevicesIntrusion Detection Systems (IDS)Intrusion Prevention Systems (IPS)Packet AnalyzersForensic DevicesVoIP RecordersRMON Analytics Tools
Where Network Taps Fit InNetwork Taps are a gateway into network traffic to provide access for monitoring toolsDeployment: In-lineFunction:Send exact copy of traffic to the monitoring tool
Avoid the pitfalls of SPAN PortsRegeneration TapsRegeneration Taps send duplicate traffic streams to several monitoring toolsDeployment: In-lineFunction:Send exact copy of traffic to multiple devices
Optimizes use of each toolAggregator TapsAggregator Taps combine multiple traffic streams and send it to monitoring toolsDeployment: In-lineFunction:Send copy of merged traffic stream to one or more devices
Monitor redundant traffic pathsBypass SwitchesFail-safe ports for monitoring vital network traffic Deployment: In-lineFunction:Copy traffic to the monitoring tool
Maintain link continuity in case of tool failure
Heartbeat Packet continually verifies link state  Data Monitoring SwitchAll-in-one device for monitoring vital network traffic Function:Provides one-to-one, many-to-one, one-to-many, and many-to-many mappings of network links and Span ports to monitor ports.ConclusionThank you for participating in this Webinar.Within 48 hours, the slide content of this webinar as well as an audio recording, will be posted to the Net Optics website at: www.netoptics.comWe invite you to review the white papers Net Optics has available for additional information regarding the deployment of Network Taps in your environment.Online White Papers:www.netoptics.com/support/default.asp?PageID=46
Thank You!Net Optics, Inc.www.netoptics.com408.737.7777

More Related Content

PPT
Network Critical
PPT
Solera Networks
PPTX
Tap Into the Health of Your Network
PPTX
New OpManager v12
PPTX
Q4S protocol
PPTX
When Your App Hits The Highway - NetFlow Analyzer V10 Overview
PPTX
OpManager training - Device discovery and classification.
PPTX
Dashboards, widgets, business views & 3D-data centre
Network Critical
Solera Networks
Tap Into the Health of Your Network
New OpManager v12
Q4S protocol
When Your App Hits The Highway - NetFlow Analyzer V10 Overview
OpManager training - Device discovery and classification.
Dashboards, widgets, business views & 3D-data centre

What's hot (19)

PPTX
Free NetFlow Analyzer training - Getting the initial settings right
PPTX
Best Network Performance Monitoring Tool
PPTX
5 Ways NCM Can Save You From A Disaster
PPTX
Inside forti os-v524-r5
PPT
Op Manager Review
PPTX
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
PPTX
PPTX
ManageEngine Firewall Analyzer training
PPTX
Network Traffic Analysis at a financial institution with 788 branches for 350...
PPTX
Free Netflow analyzer training - diagnosing_and_troubleshooting
PPTX
Virtual Firewall Management
PDF
Remote Monitoring for multi-vendor networks
PDF
Ngmesh smart methane monitor
PPTX
5 reasons why you need a network monitoring tool
PDF
Fire Eye Appliance Quick Start
PPTX
Leading American Entertainment Company implements OpManager
PPTX
OpManager Technical Overview
PPTX
Dncybersecurity
PPT
Proof of Concept Guide for ManageEngine OpManager
Free NetFlow Analyzer training - Getting the initial settings right
Best Network Performance Monitoring Tool
5 Ways NCM Can Save You From A Disaster
Inside forti os-v524-r5
Op Manager Review
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
ManageEngine Firewall Analyzer training
Network Traffic Analysis at a financial institution with 788 branches for 350...
Free Netflow analyzer training - diagnosing_and_troubleshooting
Virtual Firewall Management
Remote Monitoring for multi-vendor networks
Ngmesh smart methane monitor
5 reasons why you need a network monitoring tool
Fire Eye Appliance Quick Start
Leading American Entertainment Company implements OpManager
OpManager Technical Overview
Dncybersecurity
Proof of Concept Guide for ManageEngine OpManager
Ad

Similar to Tapping Into the Health of Your Network (20)

PPT
An Instantaneous Introduction to the Alliance Access Grid
PPT
Manageengine Netflow analyzer - An Insight
PPTX
network monitoring system ppt
PDF
Network Monitoring System ppt.pdf
PPT
Gigamon Systems
PDF
Effective and Secure Scheme for Video Multicasting using Real Time Transport ...
PPTX
Linux IT Monitoring tools - An Overview
PPT
Asynchronous Mobile Web Services:
PPT
network-management Web base.ppt
PPTX
Internship msc cs
PDF
Deploying Network Taps for Improved Security
PPT
(Download)
PPT
Op Manager Review
PPTX
NFA - Middle East Workshop
PPT
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
DOCX
How Network TAPs Can Help You Achieve 100% Network Visibility
PDF
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
ODP
Prototype Implementation of a Demand Driven Network Monitoring Architecture
PPT
Chp11 infrastructure for ec
PPTX
NetFlow Analyzer Training Part I: Getting the initial settings right
An Instantaneous Introduction to the Alliance Access Grid
Manageengine Netflow analyzer - An Insight
network monitoring system ppt
Network Monitoring System ppt.pdf
Gigamon Systems
Effective and Secure Scheme for Video Multicasting using Real Time Transport ...
Linux IT Monitoring tools - An Overview
Asynchronous Mobile Web Services:
network-management Web base.ppt
Internship msc cs
Deploying Network Taps for Improved Security
(Download)
Op Manager Review
NFA - Middle East Workshop
NetFlow Auditor Anomaly Detection Plus Forensics February 2010 08
How Network TAPs Can Help You Achieve 100% Network Visibility
Time Sensitive Networks: How changes to standard Ethernet enable convergence ...
Prototype Implementation of a Demand Driven Network Monitoring Architecture
Chp11 infrastructure for ec
NetFlow Analyzer Training Part I: Getting the initial settings right
Ad

More from LiveAction Next Generation Network Management Software (20)

PDF
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
PDF
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
PDF
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
PDF
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
PDF
Cisco1000v Net Optics Solution Brief
PDF
Infographic: Aim Straight at Your Application Performance Issues
PDF
The New Intelligent Network: Building a Smarter, Simpler Architecture
PDF
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
PPTX
Big Data is on a Collision Course With Your Network - Are You Ready?
PPTX
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
PPTX
Is the Network Tap Mightier Than the Sword
PDF
The Secret to Surviving the Network Deluge
PPTX
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
PPTX
Net Optics' Virtualization Solutions Deployment Case Study
PPTX
Lawful Interception in Virtual Environments
PPT
High-Availability Security Monitoring Using Bypass Switches
PPT
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...
VMware and Net Optics an Ixia company Provide Solutions for Monitoring for Vi...
Palo Alto Networks - Next-generation Firewall Security with Expanding Scalabi...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Phantom Virtualization Tap Plus RSA NetWitness Add Up to Exceptional Gains in...
Cisco1000v Net Optics Solution Brief
Infographic: Aim Straight at Your Application Performance Issues
The New Intelligent Network: Building a Smarter, Simpler Architecture
Leveraging vSphere 5.0 For Optimal Visibility and Efficiency
Big Data is on a Collision Course With Your Network - Are You Ready?
Overview of Net Optics Director Pro 10Gbps Data Monitoring Switch
Is the Network Tap Mightier Than the Sword
The Secret to Surviving the Network Deluge
Conquering Data Monitoring Challenges in the Realm of Derivatives Trading Sys...
Net Optics' Virtualization Solutions Deployment Case Study
Lawful Interception in Virtual Environments
High-Availability Security Monitoring Using Bypass Switches
Load Balancing Monitoring Access - Solutions for Network Monitoring Access Pe...

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Spectroscopy.pptx food analysis technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Programs and apps: productivity, graphics, security and other tools
Encapsulation_ Review paper, used for researhc scholars
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Review of recent advances in non-invasive hemoglobin estimation
Spectroscopy.pptx food analysis technology
Dropbox Q2 2025 Financial Results & Investor Presentation
20250228 LYD VKU AI Blended-Learning.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx

Tapping Into the Health of Your Network

  • 1. Tapping Into The Health of Your NetworkWebinar, Oct 28, 2010Intelligent Network Access and Monitoring Solutions
  • 2. AgendaWhy monitor the health of your network?Common network monitoring toolsWhere Network Taps fit inTypes of Network Taps and their applicationNetwork TapsRegeneration TapsAggregator TapsBypass SwitchesData Monitoring Switches
  • 3. PresenterAaron “AJ” JanssenField Application Engineer, Net Optics, Inc.Over 15 years experience deploying and configuring security & networking equipment, including Juniper Networks, Network Associates, McAfee, and Patchlink Inc.
  • 4. Why monitor the health of your network?For Many Organizations, Network Performance Directly Impacts:Customer experienceBusiness efficiencyCompetitive advantageSecurity and complianceAnd ultimately….Revenue growth
  • 5. Common Network Monitoring DevicesIntrusion Detection Systems (IDS)Intrusion Prevention Systems (IPS)Packet AnalyzersForensic DevicesVoIP RecordersRMON Analytics Tools
  • 6. Where Network Taps Fit InNetwork Taps are a gateway into network traffic to provide access for monitoring toolsDeployment: In-lineFunction:Send exact copy of traffic to the monitoring tool
  • 7. Avoid the pitfalls of SPAN PortsRegeneration TapsRegeneration Taps send duplicate traffic streams to several monitoring toolsDeployment: In-lineFunction:Send exact copy of traffic to multiple devices
  • 8. Optimizes use of each toolAggregator TapsAggregator Taps combine multiple traffic streams and send it to monitoring toolsDeployment: In-lineFunction:Send copy of merged traffic stream to one or more devices
  • 9. Monitor redundant traffic pathsBypass SwitchesFail-safe ports for monitoring vital network traffic Deployment: In-lineFunction:Copy traffic to the monitoring tool
  • 10. Maintain link continuity in case of tool failure
  • 11. Heartbeat Packet continually verifies link state Data Monitoring SwitchAll-in-one device for monitoring vital network traffic Function:Provides one-to-one, many-to-one, one-to-many, and many-to-many mappings of network links and Span ports to monitor ports.ConclusionThank you for participating in this Webinar.Within 48 hours, the slide content of this webinar as well as an audio recording, will be posted to the Net Optics website at: www.netoptics.comWe invite you to review the white papers Net Optics has available for additional information regarding the deployment of Network Taps in your environment.Online White Papers:www.netoptics.com/support/default.asp?PageID=46
  • 12. Thank You!Net Optics, Inc.www.netoptics.com408.737.7777

Editor's Notes

  • #3: [CHRIS]Today’s Webinar AgendaWhy monitor the health of your network? – what are the driving forces behind the need to monitor your networkCommon network monitoring tools – what tools are network admins currently deploying to monitor and protect the networkWhere Network Taps fit in to the monitoring picture – we’ll what a network tap is and how it fits into the monitoring architectureTypes of Network Taps and their application Network TapsRegeneration TapsAggregator TapsBypass SwitchesData Monitoring Switches
  • #4: [CHRIS] [Will hand off to Aaron after this information]Our Presenter today is Aaron Janssen, Net Optics’ Field Application Engineer. Aaron brings over 15 years experience deploying and configuring security & networking equipment, including Juniper Networks, Network Associates, McAfee, and Patchlink Inc.So without further ado, I’ll turn our presentation over to Aaron.
  • #5: [ AJ ]So why do we monitor the health of our networks?In today’s IT-driven organizations, network performance is key to providing excellent customer experiences, driving business process efficiencies, growing revenue, and maintaining competitive advantage. Network administrators, charged with keeping networks responsive to the needs of both internal and external customers, rely on network monitoring tools for a continuous stream of information to baseline and assess the network’s health. These tools enable administrators to ensure high application availability and good response times, to enforce network usage policies, to ensure the security of their network, to protect the network against possible downtime and to justify and measure the impact of network upgrades.A decline in network performance ultimately impacts an organization’s revenue growth by impacting on:The Customer Experience, whether it’s first-hand experience with a data-driven web application, or indirectly via customer facing employees being unable to access the data they need in order to serve the customer.Business Efficiencies, such as order processing can also be impacted by the lack of timely informationCompetitive Advantages may also be lost if the newest product or service is unavailable due to a crippled network infrastructureFinally, the ever increasing threat of unauthorized access of vital data requires a network administrator to be ever vigilant against possible security threats and the need to maintain records for regulation compliance
  • #6: There are variety of devices that network administrators use to monitor and maintain various portions of their network. Most network monitoring tools are task-specific. Proprietary boxes sold as “appliances” may consist internally of standard hardware components running proprietary software, often based on the Linux operating system. The performance of these tools is determined by the speeds of the processors and memory buses, and the size of the memory utilized both for caching and for buffering packets from the network. The performance of the network interface cards (NICs) is criticaltoo, for monitoring high-bandwidth 1Gbps and faster network links. More advanced tools help to alleviate these bottlenecks by adding more processors and more dedicated buffers. The type, speed, and number of processors in a tool dictate its processing performance. As network speeds increase, the number of packets that can be processed at wire speed (in other words, keeping up with the network) reaches a limit. Buffers enable the tool to handle higher peak traffic loads by storing packets during high traffic periods, and releasing them to be processed when the traffic is less. However, the inability to sustain performance at full network bandwidth, and for extended periods of high traffic, may eventually cause even the largest buffers to fill up, and the tool may not capture needed information. Common forms of Network Monitoring Tools include the following.An IDS monitors network traffic for activity that falls within the definition of banned activity for the network. When found, the IDS will alert administrators and allow them to take corrective action, blocking access to vulnerable ports, denying access to specific IP addresses, or shutting down services used to allow attacks. This fast-alert capability makes an IDS the front-line weapon in the network administrators’ war against individuals or entities attempting to gain unauthorized access to an organizations network.Intrusion Prevention Systems are similar to IDS but are usually placed in-line and will attempt to proactively block malicious intrusions.Packet Analyzers are used to record or monitor individual packet transmissions over the network usually for diagnostic purposes to analyze network problemsNetwork forensic devices focus on the capture, recording, and analysis of network events in order to discover the source of security attacks. Network investigation tools deal with volatile and dynamic information as network traffic is transmitted and then lost, so network forensic devices are constantly analyzing and storing the traffic passing through the network.Voice Over IP Recorders are commonly found within call centers for frontline customer contact and are used to record call data for later analysis.RMON Analytics tools implement the Remote Network Monitoring standard for collecting, analyzing and reporting on packet data.
  • #12: Thank you for participating in this Webinar.Within 48 hours, the slide content of this webinar as well as an audio recording, will be posted to the Net Optics website at: www.netoptics.comWe invite you to review the white papers Net Optics has available for additional information regarding the deployment of Network Taps in your environment.Online White Papers:www.netoptics.com/support/default.asp?PageID=46